A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.
|
11. A secure virtual server system, comprising:
a processor, and a non-transitory computer readable storage medium having computer readable instructions stored thereon for execution by the processor, forming:
a virtualization platform including a hypervisor;
a plurality of guest virtual machines deployed on top of the virtualization platform;
a security virtual machine deployed on top of the virtualization platform, the security virtual machine being configured to determine which of the guest virtual machines have a respective security agent installed and running;
the virtualization platform comprising one or more networking drivers for intercepting packet data traffic of respective guest virtual machines;
each networking driver comprising a fast path driver for passing the packet data traffic through provided a respective guest virtual machine has a security agent installed and running on the guest virtual machine;
each networking driver being configured to route the packet data traffic of the respective guest virtual machine through the security virtual machine for packet inspection provided the respective guest virtual machine does not have a security agent installed and running.
1. An intrusion-detection and intrusion-prevention system in a virtual server system, comprising:
a processor, and a non-transitory computer readable storage medium having computer readable instructions stored thereon for execution by the processor, forming:
a virtualization platform including a hypervisor;
one or more guest virtual machines deployed on top of the virtualization platform;
a security virtual machine deployed on top of the virtualization platform, the security virtual machine being configured to determine if the guest virtual machines have respective security agents installed and running on the guest virtual machines;
the security virtual machine comprising a plurality of virtual security agents, each virtual security agent being associated with a respective guest virtual machine through a corresponding networking driver, associated with the respective guest virtual machine,
and linking the respective guest virtual machine to a network and intercepting packet data traffic of the respective guest virtual machine;
each networking driver comprising a fast path driver for passing the packet data traffic through provided the respective guest virtual machine has a security agent installed and running on the respective guest virtual machine, for processing the packet stream in the security agent of the respective guest virtual machine;
each networking driver being configured to route the packet data traffic through a respective virtual security agent in the security virtual machine outside of the respective guest virtual machine provided the respective guest virtual machine does not have the security agent installed and running.
2. The system of
4. The intrusion-detection and intrusion-prevention system of
5. The system of
6. The system of
7. The system of
(i) verify validity of a packet of the intercepted packet data traffic based on a checksum;
(j) verify the packet based on layer 3 or 4 header information;
(k) perform a deep inspection of the packet, including inspecting payload; and
(l) return the packet to the associated networking driver.
8. The system of
9. The system of
(m) buffer and re-ordering Transmission Control Protocol (TCP) segments;
(n) verify a stateful connection sequence of the packet;
(o) verify TCP, User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) protocol dependent header fields;
(p) decrypt an encrypted payload of the packet;
(q) analyze the decrypted payload to verify that it does not contain unwanted data; and
(r) discard the packet if it fails any of the verification steps (n), (o), or (q).
10. The system of
12. The system of
13. The system of
14. The system of
15. The secure virtual server system of
16. The secure virtual server system of
17. The secure virtual server system of
18. The secure virtual server system of
(i) verify validity of a packet of the intercepted packet data traffic based on a checksum; and
(j) verify the packet based on layer 3 or 4 header information.
19. The secure virtual server system of
(k) perform a deep inspection of the packet, including inspecting payload; and
(l) return the packet to the associated networking driver.
20. The secure virtual server system of
21. The secure virtual server system of
(m) buffer and re-ordering Transmission Control Protocol (TCP) segments;
(n) verify a stateful connection sequence of the packet;
(o) verify TCP, User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) protocol dependent header fields;
(p) decrypt an encrypted payload of the packet;
(q) analyze the decrypted payload to verify that it does not contain unwanted data; and
(r) discard the packet if it fails any of the verification steps (n), (o), or (q).
22. The system of
|
The present application claims benefit to the US provisional application to McGee, Ser. No. 61/042,735 filed on Apr. 5, 2008 entitled “System And Method For Intelligent Coordination of Host and Guest Intrusion Prevention in Virtualized Environment”, which is incorporated herein by reference.
The present invention relates to computer security systems, and in particular, to system and method for intelligent coordination of host and guest intrusion prevention in virtualized environment.
Virtualization software deployments are allowing organizations to achieve significant savings in their data centers. These savings are being gained in reduced energy and hardware costs, as well as increasing the flexibility they have in the deployment of their mission-critical applications. Deployments are often seeing 10 or more virtual machines deployed on a single physical server. The driver for virtualization deployments was initially consolidation of resources, however the benefits achieved are now causing virtualization software to fundamentally affect how mission-critical applications are designed, deployed and managed. Virtualization deployments are also causing organizations to consider which security mechanisms can improve the security posture of their physical and virtual server systems.
The ability for malware to remotely exploit software vulnerabilities is the primary threat to virtualized environments as it is with physical servers.
In the first virtual server system 100, the Guest VMs 130 have access to computing resources such as networking resources only through the Hypervisor 110. The function of each v-Switch 120 is to isolate multiple Guest VMs 130 from each other while giving each Guest VM 130 access to the Hypervisor 110.
The primary location of the vulnerabilities are in the OS 150, the enterprise software (the Enterprise Applications 160), and the custom applications (the Web Applications 170) that may exist on the Guest VMs 130 as illustrated in
The service console is an asset which can have remotely exploitable vulnerabilities. Virtualization vendors such as Vmware, Inc. of Palo Alto, Calif., continue to work to simplify the service console. A white paper on VMware Infrastructure entitled “VMware Infrastructure Architecture Overview” was published by VMware on Jun. 5, 2006, which is cited in the Information Disclosure Statement submitted by the applicant. Hypervisor vulnerabilities are not typically remotely exploitable, since the hypervisor does not have services which terminate protocols that could lead to input validation errors. Hypervisor vulnerabilities will typically be exploited from malware, which gets on to a virtual machine, i.e. on of the Guest VMs 130 and one of the best methods to protect against this is to protect against the malware getting installed there in the first place.
In protecting software vulnerabilities, virtualized environments present similar challenges for the intrusion-detection systems and intrusion-prevention systems (IDS/IPS) typically deployed in a data center, but they also present some new challenges and opportunities. It is now clear that hardware appliance based security is not sufficient to protect virtualized environments, since these devices are blind to the traffic being sent between virtual machines on a physical server. In addition, the dynamic nature of virtualized environments, with older snapshots being quickly restored and virtual machines being moved between physical servers to optimize resource use present challenges that do not exist with physical servers. The opportunity presented is that the investment in multi-processor, multi-core computing and the virtualization layer that manages it can also be leveraged to deploy the security mechanisms required to secure it.
When deciding on an approach to virtualization security, organizations can use similar security principles that have emerged in their physical environments over the last few years. One of these principles is “defence-in-depth”, which is a fundamental security requirement for organizations that recognize the “de-perimeterization” that has emerged in their information technology deployments. The Jericho Forum has defined a set of commandments that should be observed when planning for a de-perimeterized future, published at “http://www.opengroup.org/jericho/commandments_v1.1.pdf”.
The first fundamental of the Jericho Forum commandments is:
Virtualization has made the challenge of de-perimeterization even more challenging. The inability of appliance based security to deal with attacks between virtual machines on the same server makes clear the need for mechanisms to be deployed on the server to protect these environments. A requirement has emerged for a virtualization security approach that allows protection of an asset to occur as close as possible to the asset itself.
There are two approaches currently being taken to protecting virtual machines with security software on the server.
Such security overlay solutions provide protection for Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) against attacks which are coming from the network, but they have significant limitations. These limitations include:
Accordingly, there is a need in the industry for further development of and improved method and system for intrusion prevention/detection in a virtualized environment, which would avoid or mitigate shortcomings of the prior art.
There is an object of the invention to provide an improved system and method for intelligent coordination of host and guest intrusion prevention in virtualized environment.
According to one aspect of the invention, there is provided a computer implemented method of intrusion-detection and intrusion-prevention for a guest virtual machine deployed on top of a virtualization platform of a virtual server system, comprising steps of:
The step (d) comprises:
In the embodiment of the invention, the guest virtual machine may be pre-configured with the security agent. Beneficially, the virtual security agent runs in a security virtual machine. Alternatively, the virtual security agent may run in the virtualization platform.
The step (b) of the method described above comprises discarding packets whose headers contain information that matches with predetermined criteria.
Preferably, the step (h) comprises:
The method may further comprise reassembling the packet from packet fragments in the intercepted packet stream before performing the steps (j) and (k), and fragmenting the packet into the packet fragments after performing said steps (j) and (k).
In the method described above, the step (k) comprises:
According to another aspect of the invention, there is provided an intrusion-detection and intrusion-prevention system in a virtual server system comprising a processor, and a computer readable storage medium having computer readable instructions stored thereon, which, when executed by the processor, form the following:
In the system described above, the security virtual machine comprises a virtual security agent for performing intrusion-detection and intrusion-prevention inspection on the intercepted data traffic.
Preferably, the networking driver includes a firewall.
The networking driver includes a fast path driver for bypassing the data traffic through when the guest virtual machine has a security agent, and for intercepting the data traffic otherwise.
In the embodiment of the invention, the security virtual machine comprises a plurality of virtual security agents, each security agent is associated with a respective guest virtual machine through a corresponding networking driver associated with the said guest virtual machine.
According to yet another aspect of the invention, there is provided a secure virtual server system comprising:
a processor, and a computer readable storage medium having computer readable instructions stored thereon, which, when executed by the processor, form the following:
The security VM comprises a plurality of virtual security agents, each security agent corresponsing to a respective guest virtual machine, for performing intrusion-detection and intrusion-prevention inspection on the intercepted data traffic.
Each networking driver includes a firewall for filtering the data traffic.
Each networking driver includes a fast path driver for bypassing the data traffic through when a corresponding guest virtual machine has a security agent, and for intercepting the data traffic otherwise.
Preferably, the virtual security agents perform deep packet inspection of the data traffic on behalf of the respective guest virtual VMs.
A computer readable storage medium, having computer readable instructions stored thereon, which, when executed by a processor, perform the steps of the method described above, is also provided.
The embodiments of present invention will be more fully understood from the following detailed description of the preferred embodiments that should be read in light of the accompanying drawings. These drawings should not be construed as limiting the present invention, but are intended to be exemplary only.
In contrast to the prior art described in the Background section, the IDS/IPS functionality according to embodiments of the present invention is deployed in a distributed fashion.
This approach does not have the same Inter-VM traffic, Mobility and Non-transparent limitations of the overlay IDS/IPS approach of the prior art. Its performance impact is distributed across the virtual machines, taking advantage of the virtualization software platform. The latency impact in this approach is reduced since data is being queued and inspected at a point in the virtual machine where it is already being queued. However, in order to protect the preconfigured Guest VMs 260 of the basic secure virtual server system 250, each such preconfigured Guest VMs 260 has to be configured with a copy of the IDS/IPS security appliances 220, which may be inconvenient in some cases, and may also limit the choice of operating systems and other characteristics of the guest machines to be compatible with the installation of the IDS/IPS security appliance 220.
In a second embodiment of the invention, this shortcoming of the basic secure virtual server system 250 is overcome by distributing IDS/IPS security functions in the virtualization software platform and a common security VM, as described in the following.
The virtualization platform 302 may be based on a commercially available product such as the VMWare Infrastructure available from VMWare Inc., which includes a hypervisor (software module) 312 and vSwitch modules 314, similar to the virtual servers of the prior art, and of the basic secure virtual server 250. In addition, the virtualization platform 302 comprises a special limited version of a vSwitch, designated an internal vSwitch_prime (vSwitch*) 316, and a plurality of networking drivers 318-i, i=1−n. Three of the networking drivers 318-i are shown in
As is customary in such a virtualization architecture, each guest VM 306-i is able to access an external network 320, indicated symbolically with a double pointed arrow, through the services of the hypervisor 312. In the example shown in
The secure virtual server system 300 according to the embodiment of the invention has the following components:
In the embodiments of the secure virtual server system 300, all network packets destined to, and originating from, guest VMs 318-i can be IDS/IPS filtered, either in the guest VMs themselves if they are preconfigured guest VMs with IDS/IPS security appliances installed as described in the basic secure virtual server of
The security-VM 304 is similar to a guest VM in the sense of including an operating system OS 310, and one or more applications, i.e. the Security Application 322 in this case. But it may be privileged in that is connected with special application program interface (API) hooks into the virtualization platform 302 which allows it to communicate with all guest VMs directly as well as through the internal vSwitch_prime (vSwitch*) 316 and the networking drivers 318.
The design of the security VM 304 is facilitated by a privileged access to a hypervisor API that is based on the recently developed program VMSafe of VMware, Inc. see “VMware VMsafe Security Technology” published on-line at “http://vmware.com/overview/security/vmsafe.html”.
Through the use of introspection APIs, see, for example “Radically Transforming Security and Management in a Virtualized World: Concepts”, Neil MacDonald, Gartner Inc, Mar. 14 2008, ID Number: G00154794, the functions of the security VM 304 can access privileged state information about each guest VM 306, including the memory, state and network traffic. Therefore, for IDS/IPS filtering, the Inter-VM and Non-transparent limitations of the overlay IDS/IPS approach of the prior art are removed, since all network traffic within the server can be seen by the security VM 304.
The Security Application 322 of the security-VM 304 includes a master agent module 410, a number of virtual security agents 412, a FilterLib software library 414, and Slow Path Engine (SPE) 326. The master agent module 410 is a template from which individual virtual security agents 412 are generated as required, to cooperate with the (unmodified) guest VMs, e.g. the guest VM 306-1.
The OS 310 of every virtual machine (VM), including the OS 310 of the guest VMs 306-1 and 306-2 and of the security-VM 304, includes a virtual network interface card (vNIC) 416 which is a programmatic interface of the VM for communicating with the vSwitches 314 of the virtualization platform 302. All packet traffic between a guest VM 306-i and the external network 320 passes through the vNIC 416 of the VM and the associated networking driver 318-i.
In addition to a regular vNIC 416, the OS 310 of the security-VM 304 includes a programmatic interface to the internal vSwitch* 316 through a special vNIC_prime (vNIC*) 418. The internal vSwitch* 316 is coupled over linkages 420 with each of the networking drivers 318-i, including the ND-1 (318-1) that is associated with the unmodified guest VM 306-1.
Functions of the security-VM 304 include:
As shown in
In the case of the pre-configured VM 306-2, packet inspection and filtering is provided by the inspection engine 408 under control of the security agent 406, both of which reside in the pre-configured VM 306-2. In this case, the security-VM 304 configures the associated networking driver 318-2 in a fast-path mode, that is to pass all packet traffic with minimum filtering. By using the fast-path driver 324, higher efficiency may be obtained while the security-VM 304 is still in control and is able to intervene in the event that the pre-configured VM 306-2 is mis-behaving.
In the embodiments of the invention described above, the secure virtual server system 300 comprises a processor, and a computer readable storage medium, e.g., computer memory, CD-ROM, DVD, floppy or other storage medium, having computer readable instructions stored thereon, which, when executed by the processor, form the virtualization platform 302 including the hypervisor 312; one or more guest virtual machines 306 deployed on top of the virtualization platform 302; a security virtual machine 304 deployed on top of the virtualization platform 302; and one or more networking drivers 318 in the virtualization platform 302 for linking the guest virtual machines 306 to a network 320, and for intercepting data traffic of the guest virtual machines 306 and routing it through the security virtual machine 304. For greater certaintly, all components of the virtual server system shown in
A computer readable storage medium is also provided, such as DVD, CD-ROM, floppy, computer readable memory or other medium, which has computer readable instructions stored thereon, which, when executed by a processor, perform the steps of the method described in the following
The security-VM 304 monitors the state of the guest VM. If the guest VM 306 is a guest VM that includes a security agent (406) such as the guest VM-2 306-2 (
In a step 506 “Guest Agent Running?”, it is determined whether the security agent 406 is installed and running. If the security agent 406 is installed and running (exit “Yes” from the step 506), the packet needs no further inspection and may be passed to the exit in a step 508 “Pass Packet” and injected into the packet stream in the step 504 “Inject Packet”.
If the security agent 406 is not installed or not running (exit “No” from the step 506), the packet is processed through a fast filter in a step 510 “Micro filter”, in which a quick decision is made on the acceptability of the packet as in a firewall. The step 510 has three possible exits, “blacklist”, “bypass”, and “OK”. The packet is discarded and removed from the packet stream, (exit “blacklist”) in a step 512 “Discard Packet” if it matches certain programmable blacklist criteria, e.g. on the basis of protocol, IP address range, and/or port number. The packet is passed (step 508) and injected back into the packet stream (step 504) if the bypass mode is enabled. The purpose of the bypass mode is to provide less per-packet processing, i.e. provide higher efficiency, in cases where intrusion detection and prevention has already occurred for a packet stream. For example traffic between two guest VMs 306 (e.g. VM-1 and VM-2, see
If the packet passes the “Micro filter” step 510, i.e. it is not blacklisted and it is not bypassed, a determination is made in a step 514 “Inline/Offline” whether the “slow path” (inline) or the “fast path” (offline) should be taken, based on a state of the networking driver 318. In the “fast path” case (“off-1” exit from the step 514), the packet is passed (step 508) and injected back into the packet stream (step 504). A copy of the packet is also forwarded (“off-2” exit from the step 514) in a step 516 “Send packet copy to watchdog” to the security VM 304 for monitoring. The security VM 304 may monitor the copied packet in a step 518 “Monitor packet in Security VM” for the purpose of statistics or to perform additional packet inspections, and in general perform a watchdog function. Note that the packet stream continues unimpeded through the steps 508 “Pass Packet” while the watchdog function may be performed in parallel.
In the “slow path” case the packet is actually removed from the packet stream in a step 520 “Remove packet from stream” and routed through the security VM 304 before being re-injected back into the packet stream. This is illustrated in
Forwarding of packets from the steps 516 and 522 to the steps 518 and 524 respectively, and similarly in the opposite direction from the step 524 to the step 528, may preferably occur in TCP (Transmission Control Protocol) sessions that are established between the networking driver 318 and the security VM 304.
The virtual security agents 412 are equivalent to the security agent 406 that may exist in pre-configured VMs, e.g. the pre-configured VM 306-2. Bundling all virtual security agents 412 used in protecting associated guest VMs 306 (e.g. the unmodified guest VM 306-1) in the security VM 304 to run the “slow-path” function for each associated guest VM 306 as independent processes or threads, has the advantage of robustness and universality. It also provides a design simplification, because the design of the security agent 406 may be reused for the virtual security agents 412, and the design of the inspection engine 408 can be reused for the slow-path engine 326.
In an alternative embodiment of the invention, the “slow-path” process functions may be implemented in modules residing within the virtualization platform 302, which has the advantage of potentially faster operation because the overhead of sending each packet from the networking drivers 318 to the security VM 304 may be avoided. This method relies on special interface hooks (API) in the hypervisor 312, which may not be available in all versions of the virtualization platform 302 that is used.
Packets arrive from the fast path (flow chart tag “A”) in
In the step 604 “Reassembly”, IP packets in the intercepted packet stream that may have been fragmented (e.g. to meet layer 2 protocol constraints) are reassembled. In other words, IP packets may have been fragmented into packet fragments before arriving at the secure virtual server 300, for example, due to limitations of the layer 2 network over which the packet stream was transmitted. Such packets need to be reassembled from the fragments before filtering and deep inspection can be applied.
In the step 606 “Packet Filter” a stateless check of layer 3/4 properties in the header of the packet is performed, in which address and port numbers are compared with programmed lists of acceptable and blacklisted ranges. Failing packets are removed (exit “fail” from the step 606) and discarded in the step 526 of
In the step 608 “TCP Normalization”, TCP segments that may arrive out of order, are buffered and re-ordered. This is necessary to allow deep inspection to occur in the next step 610.
In the step 610 “Deep Inspection”, deep inspection on the packet is performed using facilities of the FilterLib software library 414 (
In the step 612 “Fragmentation”, packets that had been reassembled in the step 604 “Reassembly” are re-fragmented and returned to their original fragmentation state. In other words, a reassembled packet (cf. step 604) is fragmented again before re-inserting it back into the packet stream.
In the step 614, a stateful connection sequence of the packet is verified, based on the protocol sequence specified for packets of a TCP, UDP, or ICMP packet stream by verifying the correct sequence of packet flags.
In the step 616, a protocol dependent check (e.g. correct checksums and sequence numbers in the packet headers) TCP, ICMP and UDP packets are confirmed.
In the step 618 decrypting of the SSL layer is performed so that a clear text of the payload can be inspected. The step 618 is skipped if no SSL layer is present.
Finally, in the step 620 a detailed analysis of the packet payload is performed.
Packets that have survived the complete “slow path” processing step 600 are returned to the security VM 304 (flow chart tag “B”) to be added to the packet stream (step 528,
The coordinated approach to protecting virtualized environments includes the security agent 406 that can be deployed on guest VMs 306, as well as the security VM 304 as illustrated in
The coordination sequence is as follows:
But not all virtual machines will have a Security Agent installed.
Multiple Virtualization Platforms
Although the embodiment of the invention has been described with regard to virtualization platforms based on VSafe software from VMware Inc., it is understood that the techniques described, can be also applied to other virtualization platforms, for example, Microsoft Windows Server Virtualization, Citrix Xen, and Virtual Iron.
It is also understood that a functionally of the security VM 304 on each of these platforms may vary, but the coordination approach for IDS/IPS data inspection described above will still be applicable to each of the virtualization platforms.
Thus, improved methods and a system for intelligent coordination of intrusion prevention in a virtualized environment have been provided.
The IDS/IPS method and system of the embodiment of the invention have an advantage of protecting virtual machines that have a built-in security agent, as well as protecting virtual machines, which do not have a security agent. The advantage of this coordinated architecture is that traffic destined for a guest VM 306 which has an IDS/IPS security agent 406 deployed (e.g. the pre-configured VM 306-2) will not incur any significant delay, being routed directly from the hypervisor to the guest VM 306-2. Traffic for the remaining guest VMs (e.g. the unmodified guest VM 306-1), which do not have a security agent, can be intercepted in the respective associated networking driver (318-1) and processed the security VM 304, and the impact that this central processing has can thus be minimized.
In using the benefits of the embodiments of the present invention, organizations are no longer required to deploy additional security hardware in order to protect their data center computing. The investments they are making in multi-processor, multi-core architectures and virtualization can also be leveraged to provide security mechanisms to protect these environments. Virtualization allows servers and server-hosted desktops to be protected to a level that exceeds their physical counterparts. These deployments can be protected today and enhanced as introspection capabilities emerge in the virtualization platforms. A coordinated approach of the embodiment of the present invention with security software that can be flexibly deployed as a Security VM in combination with a security agent on guest virtual machines will give organizations the agility necessary to see continued success with their virtualization deployments.
Although the invention has been illustrated with the reference to specific embodiments, it will be apparent to those skilled in the art that various changes and modifications may be made which clearly fall within the scope of the invention. The invention is intended to be protected broadly within the spirit and scope of the appended claims.
Patent | Priority | Assignee | Title |
10003614, | Sep 23 2013 | ZTE Corporation | Method, device, and storage medium for deep packet inspection control |
10095534, | Feb 24 2015 | Red Hat Israel, Ltd.; Red Hat Israel, Ltd | Guest controlled virtual device packet filtering |
10419396, | Dec 22 2016 | VMware, Inc. | Deep packet inspection with enhanced data packet analyzers |
10469375, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Providing network communications using virtualization based on information appended to packet |
10581859, | Aug 07 2017 | International Business Machines Corporation | Detection and prevention of attempts to access sensitive information in real-time |
10664593, | Oct 29 2015 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Checking a security value calculated for a part of a program code |
10678583, | Feb 24 2015 | Red Hat Israel, Ltd. | Guest controlled virtual device packet filtering |
11212288, | Aug 07 2017 | International Business Machines Corporation | Detection and prevention of attempts to access sensitive information in real-time |
8539098, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Multiplexed client server (MCS) communications and systems |
8700898, | Oct 02 2012 | CA, Inc. | System and method for multi-layered sensitive data protection in a virtual computing environment |
8839447, | Feb 27 2012 | CA, INC | System and method for virtual image security in a cloud environment |
8848704, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Facilitating network routing using virtualization |
8954964, | Feb 27 2012 | CA, INC | System and method for isolated virtual image and appliance communication within a cloud environment |
8955110, | Jan 14 2011 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | IP jamming systems utilizing virtual dispersive networking |
8959627, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Quarantining packets received at device in network communications utilizing virtual network connection |
9009471, | Oct 02 2012 | CA, Inc. | System and method for multi-layered sensitive data protection in a virtual computing environment |
9055042, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Providing network communications satisfying application requirements using virtualization |
9055386, | Nov 02 2009 | International Business Machines Corporation | Endpoint-hosted hypervisor management |
9059975, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Providing network communications using virtualization based on protocol information in packet |
9071607, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Virtual dispersive networking systems and methods |
9100405, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Apparatus, systems and methods utilizing dispersive networking |
9166988, | Apr 22 2014 | KOREA INTERNET & SECURITY AGENCY | System and method for controlling virtual network including security function |
9167025, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Network communications of application running on device utilizing routing of data packets using virtual network connection |
9241025, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Network communications of applications running on devices utilizing virtual network connections with asymmetrical network paths |
9241026, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Facilitating network communications with control server and devices utilizing virtual network connections |
9246980, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Validating packets in network communications |
9350794, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Transmitting packet from device after timeout in network communications utilizing virtual network connection |
9389898, | Oct 02 2012 | CA, Inc.; CA, INC | System and method for enforcement of security controls on virtual machines throughout life cycle state changes |
9436832, | Feb 27 2012 | CA, Inc. | System and method for virtual image security in a cloud environment |
9634931, | Oct 17 2007 | DISPERSIVE HOLDINGS, INC ; ASSET RECOVERY ASSOCIATES, LLC | Providing network communications using virtualization based on protocol information in packet |
9794275, | Jun 28 2013 | CA, INC | Lightweight replicas for securing cloud-based services |
9817687, | Feb 27 2012 | CA, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
9906557, | Jun 30 2014 | International Business Machines Corporation | Dynamically generating a packet inspection policy for a policy enforcement point in a centralized management environment |
Patent | Priority | Assignee | Title |
7660265, | Oct 27 2006 | TWITTER, INC | Network packet inspection and forwarding |
8166474, | Sep 19 2005 | VMware LLC | System and methods for implementing network traffic management for virtual and physical machines |
8190778, | Mar 06 2007 | Intel Corporation | Method and apparatus for network filtering and firewall protection on a secure partition |
20020083344, | |||
20040093513, | |||
20040143751, | |||
20050028013, | |||
20060031476, | |||
20080148341, | |||
20080163207, | |||
20080192740, | |||
20080222309, | |||
20080320594, | |||
20090073895, | |||
20090150996, | |||
20090328193, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 02 2009 | MCGEE, WILLIAM GERALD | THIRD BRIGADE INC | CORRECTIVE ASSIGNMENT TO CORRECT THE THE NAME OF THE CITY IN THE ASSIGNEE ADDRESS PREVIOUSLY RECORDED ON REEL 022503 FRAME 0611 ASSIGNOR S HEREBY CONFIRMS THE CORRECT THE CITY IN THE ASSIGNEE ADDRESS FROM KANATA, ONTARIO, CANADA K2K2M5 TO OTTAWA, ONTARIO, CANADA K2K2M5 | 022923 | /0770 | |
Apr 02 2009 | MCGEE, WILLIAM GERALD | THIRD BRIGADE INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 022503 | /0611 | |
Apr 03 2009 | TREND MICRO INCORPORATED | (assignment on the face of the patent) | / | |||
Apr 28 2009 | THIRD BRIGADE INC | TREND MICRO KABUSHIKI KAISHA | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023418 | /0552 | |
Aug 03 2009 | TREND MICRO KABUSHIKI KAISHA | TREND MICRO INCORPORATED | CONFIRMATION OF COMPANY NAME AND ADDRESS | 023418 | /0501 |
Date | Maintenance Fee Events |
Aug 24 2016 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 24 2016 | STOL: Pat Hldr no Longer Claims Small Ent Stat |
Nov 16 2020 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Nov 14 2024 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
May 14 2016 | 4 years fee payment window open |
Nov 14 2016 | 6 months grace period start (w surcharge) |
May 14 2017 | patent expiry (for year 4) |
May 14 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 14 2020 | 8 years fee payment window open |
Nov 14 2020 | 6 months grace period start (w surcharge) |
May 14 2021 | patent expiry (for year 8) |
May 14 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 14 2024 | 12 years fee payment window open |
Nov 14 2024 | 6 months grace period start (w surcharge) |
May 14 2025 | patent expiry (for year 12) |
May 14 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |